General

  • Target

    3624-1165-0x0000000000CF0000-0x0000000000D2E000-memory.dmp

  • Size

    248KB

  • MD5

    08e112b7b4b6cbd917690ff96732c415

  • SHA1

    a26018c59e3f4382e12e7ee9eff72880cf037c9b

  • SHA256

    8ad485e585b3102839c3f627fc00b2432ebf1cd6a4d13bef1343c8255a5602eb

  • SHA512

    c8e8ee72718fac705874610f8b5019cd5246e75aefbc92d2c9e77061b0730a4c71ac9f681ffbac560bc69fbf7d8f789bf337dd5077163b81d06fc88663660828

  • SSDEEP

    3072:tVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLf:nyymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3624-1165-0x0000000000CF0000-0x0000000000D2E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections